Virtual Event Now Live: Zero Trust Strategies Summit! - Login for Access
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Microsoft Urges Customers to Patch Recent Active Directory Vulnerabilities

Microsoft on Monday released an alert on two Active Directory vulnerabilities addressed with the November 2021 Patch Tuesday updates, urging customers to install the available patches as soon as possible, to prevent potential compromise.

Microsoft on Monday released an alert on two Active Directory vulnerabilities addressed with the November 2021 Patch Tuesday updates, urging customers to install the available patches as soon as possible, to prevent potential compromise.

Tracked as CVE-2021-42287 and CVE-2021-42278, the two security errors can be chained to impersonate domain controllers and gain administrative privileges on Active Directory.

Proof-of-concept code exploiting the two bugs has been public for more than a week, and Microsoft is warning companies of potential malicious attacks, while also sharing a guide to help organizations identify suspicious behavior exploiting the flaws.

“When combining these two vulnerabilities, an attacker can create a straightforward path to a Domain Admin user in an Active Directory environment that hasn’t applied these new updates. This escalation attack allows attackers to easily elevate their privilege to that of a Domain Admin once they compromise a regular user in the domain,” Microsoft explains.

CVE-2021-42278 is a security bypass vulnerability where attackers can employ computer account sAMAccountName spoofing to impersonate a domain controller.

sAMAccountName attributes, Microsoft notes, usually have “$” at the end of their names, which is meant to help distinguish between user and computer objects. Because of the bug, a normal user “has permission to modify a machine account (up to 10 machines) and as its owner, they also have the permissions to edit its sAMAccountName attribute,” Microsoft explains.

[ READ: PoC Exploit Published for Latest Microsoft Exchange Zero-Day ]

Also a security bypass flaw, CVE-2021-42287 affects the Kerberos Privilege Attribute Certificate (PAC), also leading to domain controller impersonation. The vulnerability results in the Key Distribution Center (KDC) creating service tickets with higher privilege levels than those of the domain account.

Advertisement. Scroll to continue reading.

During authentication using Kerberos, Ticket-Granting-Ticket (TGT) and the Ticket-Granting-Service (TGS) are requested from KDC. If the account for which TGS was requested could not be found, KDC would append a trailing $ to attempt to find it again.

“For example, if there is a domain controller with a SAM account name of DC1$, an attacker may create a new machine account and rename its SAM account name to DC1, request a TGT, rename it again for a different name, and request a TGS ticket, presenting the TGT he has in hands,” Microsoft notes.

Thus, with the lookup for DC1 failing, the KDC will attempt to find the machine trailing $, and “will issue the ticket using the privileges of DC1$.”

An attacker in the possession of domain user credentials can combine the two vulnerabilities and exploit them to gain domain admin privileges.

Microsoft has published a guide to help organizations identify any suspicious behavior related to the exploitation of these vulnerabilities by detecting abnormal device name changes and comparing them to a list of domain controllers in the target environment.

“As always, we strongly advise deploying the latest patches on the domain controllers as soon as possible,” Microsoft notes.

On November 14, the company released an out-of-band update to address a series of non-security issues related to applying the November 9 security updates.

Related: Zero-Days Under Attack: Microsoft Plugs Exchange Server, Excel Holes

Related: Microsoft Patches 67 Security Flaws, Including Zero-Day Exploited by Emotet

Related: Windows URI Handling Flaw Leads to Drive-by Code Execution

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

Omkhar Arasaratnam, former GM at OpenSSF, is LinkedIn's first Distinguised Security Engineer

Defense contractor Nightwing has appointed Tricia Fitzmaurice as Chief Growth Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.